Going Virtual? Keep One Eye On The Hardware And The Other On Habits

Going Virtual? Keep One Eye On The Hardware And The Other On Habits

Going Virtual? Keep one eye on the hardware and the other on habits

Central to the huge trade and education event called VMWorld is the notion that everything is going virtual in a big way. Terms such as virtualization and software defined networking are now becoming mainstream, or more more precisely, must now become mainstream, and the 22,000+ conference attendees are listening and talking intently. VMWorld CEO Pat Gelsinger, as well as VMWorld Hybrid Cloud SVP Bill Fathers, and others demonstrated during the Monday morning opener that not only is virtualization crucial to the commercial success of organizations moving forward, but many key players including eBay and GE have already embraced it.
Iddo Kadim

This comes as no surprise to experts like Iddo Kadim, Director of Datacenter Technologies for Intel. He points out that this is no mere swing on the roundabout, a repetition of the growth of mainframe or networked technologies from previous eras; it is now a matter of scale across more than just the physical dimension. The high-tech environment has grown to a size where management of it has gone far beyond simply being a hardware issue. “The manual processes that are required to manage it the old way,” he says, “can’t keep up with the growth that is required to satisfy the demand for compute, storage and networking.” As an example he adds, “you can count 100 jelly-beans, even if it takes time to get it right. But try counting 10,000.”

Kadim states that in this newest of new ages, there needs to be a desegregation of control from physical infrastructure. There needs to be an automated, separated place where software resides a layer above the hardware itself, in order to facilitate multiple operating systems and applications.

He points out that there still exists great deal of confusion with the term cloud, let alone virtualization. Executives, he said, must be careful not to get carried away. As with all major change, they might find untenable risks to their business if issues of control are managed separately, such as by a third party provider who, by owning the information, essentially owns the business.

In makes sense, he says, for organizations to first build a private cloud. By doing this they can virtualize the separate elements and grown and scale as needed. He describes this as a type of automation umbrella: “build internally with an awareness for an eventual hybrid cloud later.”

Kadim also made an excellent point about the inevitable abstraction that comes from virtualization. Even as a company builds a virtualization strategy, at end of day, the applications still work on hardware – they work differently, and more dynamically, but machines are still there, somewhere. That means that to have real control, decision-makers still need to have information about their infrastructure. They still need to say, “these are my walls, these are my machines.” Even though the data and the processing have become virtual, adequate information in on the mechanical is essential.

CloudTweaks asked Kadim for his thoughts regarding the recent outages suffered by Amazon, Google, Apple, and Sony, and how this affects public perception and acceptance of major technological leaps forward such as those we now face. He echoed the sentiments of many leaders in the virtualization community, including Simon Crosby, ex of Intel and Citrix, and now founder of and CTO of Bromium, who, at Interop 2011 stated that cloud technology, in terms of reliability and safety, is much like commercial airlines, in that big planes do not go down very often, and when they do, the results can be painful, but overall, the cloud remains safer than IT infrastructure, as planes are when compared to private cars.

Bad things happen, Kadim continues, even when redundancy is built in, when there is a confluence of events. Sometimes the failure is total, and other times it is partial, as in the example of Netflix, where some services blacked out but others remained. The bottom line, he says is that there must be clear communication between a company and its cloud vendors – clear dialog, and clear understanding. As with many other areas of life, it is up to the customer to establish the rules and to demand clarity, to ensure that loss of control or of data or even presence is unlikely and never total.

There are many providers out there who will start to offer virtualization services to align with the growth in demand. Some will come from a hosting background and will build an enterprise mindset. Others will embrace the Amazon model: a blank infrastructure with an impressive partner ecosystem, which is built well, with other well-built services included on top.

Kadim warns that as organizations large and small move into the new world of software defined networking, effectively separating the intelligence from the hardware, that they do so without falling prey to either hype or outdated mindsets.

Mr. Kadim and other brilliant minds are here with CloudTweaks at the VMWorld 2013 conference in San Francisco. The conference repeats in Barcelona in October.

By Steve Prentice

Post is sponsored by Hitachi and MaximizeYourIT.com

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…